Designing Motorcycle Security System Using E-KTP Sensor and SMS Gateway

Author(s):  
Juani Khuswara Maulidin ◽  
Abrar Hiswara ◽  
Rafika Sari

Motorcycle demand is increasing as well as the cases of vehicle theft in Indonesia. Not only increase theft cases, number of new modes of theft of the motorcycle is also increase. According to the Statistics Supervisory Agency (BPS) data from 2015 to 2018, the data on the number of motorcycles is increasing, starting every year around 126,508,776 motorcycles are sold in Indonesia. In Indonesia, it is estimated that hundreds of motorbikes are stolen every month. How is the feasibility of motorcycle safety devices and the accuracy of the RFID module. Creating a motorcycle security system using a microcontroller-based RFID-RC522 module that can be read accurately and can be monitored in real time using received SMS and test the feasibility of a motorcycle safety device that can be monitored via cellphone. Making this tool using the Prototype method. The prototype is a development method from the previous system. The results of this research are in accordance with the analysis and design that has been made to get the result of an E-KTP-based motorcycle safety device to increase the security of personal items because this device can activate and deactivate motorcycles by using SMS. This tool can also help the community in maintaining security around the surrounding environment so that they can add a double security system to motorcycle vehicles.

2019 ◽  
Vol 8 (2) ◽  
Author(s):  
Didin Khaerudin ◽  
Suherli Kusmana ◽  
Iyay Robia Khaerudin

Research conducted to develop drama text teaching materials based on the experience of the author of the drama script aims to make it easier for students to understand drama text material. In addition, based on the author's experience students are expected to emulate the author's creative process in writing a paper. The research method used in this research is the research and development method. Based on the results of the interview it can be concluded that the ability to write drama is determined based on mastery of the elements of drama and the ability to develop stories based on the author's experience. The process of writing drama is done in several steps: (1) searching for ideas based on personal experience, other people, or the surrounding environment; (2) processing ideas to find plots (characters), characters or characters that vary with their inner conflicts, settings and dialogues, interesting conflicts, and messages to be conveyed; (3) starts the process of writing drama with stages and elements of drama; (4) revision of drama products. Teaching material developed is presented from basic competencies of knowledge and basic competencies of learning skills. Based on experiments on developed teaching materials it is known that the average value of the ability to write plays gets a score exceeding the minimum criteria, so that the teaching materials used are effective. Based on observations it is known that teaching materials can help students in learning and student activities become more independent, and active.


2020 ◽  
Vol 32 ◽  
pp. 03054
Author(s):  
Akshata Parab ◽  
Rashmi Nagare ◽  
Omkar Kolambekar ◽  
Parag Patil

Vision is one of the very essential human senses and it plays a major role in human perception about surrounding environment. But for people with visual impairment their definition of vision is different. Visually impaired people are often unaware of dangers in front of them, even in familiar environment. This study proposes a real time guiding system for visually impaired people for solving their navigation problem and to travel without any difficulty. This system will help the visually impaired people by detecting the objects and giving necessary information about that object. This information may include what the object is, its location, its precision, distance from the visually impaired etc. All these information will be conveyed to the person through audio commands so that they can navigate freely anywhere anytime with no or minimal assistance. Object detection is done using You Only Look Once (YOLO) algorithm. As the process of capturing the video/images and sending it to the main module has to be carried at greater speed, Graphics Processing Unit (GPU) is used. This will help in enhancing the overall speed of the system and will help the visually Impaired to get the maximum necessary instructions as quickly as possible. The process starts from capturing the real time video, sending it for analysis and processing and get the calculated results. The results obtained from analysis are conveyed to user by means of hearing aid. As a result by this system the blind or the visually impaired people can visualize the surrounding environment and travel freely from source to destination on their own.


2014 ◽  
Vol 989-994 ◽  
pp. 5520-5523 ◽  
Author(s):  
Zhi Ping Peng

The networking technology in warehouse management can be automated cargo management, operations and real-time access to inventory. Application networking technology greatly reduces the workload of warehouse management and unnecessary losses. Through the intelligent management of the goods, but also improve the utilization of warehouse space, to enable enterprises to understand the real-time inventory, thereby reducing inventory costs, improve the accuracy of inventory management.


2018 ◽  
Vol 8 (11) ◽  
pp. 2305 ◽  
Author(s):  
S Rana ◽  
Miah Halim ◽  
M. Kabir

Internet of Things (IoT) opens new horizons by enabling automated procedures without human interaction using IP connectivity. IoT deals with devices, called things, represented as any items from our daily life that are enhanced with computing or communication facilities. Among various mobile communications, Zigbee communication is broadly used in controlling or monitoring applications due to its low data rate and low power consumption. Securing IoT systems has been the main concern for the research community. In this paper, different security threats of Zigbee networks in the IoT platform have been addressed to predict the potential security threats of Zigbee protocol and a Security Improvement Framework (SIF) has been designed for intelligent monitoring in an office/corporate environment. Our proposed SIF can predict and protect against various potential malicious attacks in the Zigbee network and respond accordingly through a notification to the system administrator. This framework (SIF) is designed to make automated decisions immediately based on real-time data which are defined by the system administrator. Finally, the designed SIF has been implemented in an office security system as a case study for real-time monitoring. This office security system is evaluated based on the capacity of detecting potential security attacks. The evaluation results show that the proposed SIF is capable of detecting and protecting against several potential security attacks efficiently, enabling a more secure way of intelligent monitoring in the IoT platform.


Author(s):  
I Komang Krisna Ade Marta ◽  
I Nyoman Buda Hartawan ◽  
I Kadek Susila Satwika

AbstrakKeamanan server merupakan hal penting yang perlu diberikan perhatian lebih saat melakukan konfigurasi server. Pada umumnya serangan yang terjadi pada server diketahui setelah terjadinya kegagalan pada server dalam memberikan layanan. Pada penelitian ini, dibangun sebuah sistem keamanan server yang dapat melakukan monitoring pada sebuah server ketika terdeteksi adanya aktivitas yang tidak wajar. Pemberitahuan akan dikirimkan melalui SMS (Short Message Service) ke handphone Administrator jaringan. Sistem yang dibangun melakukan pendeteksian intrusi pada server secara realtime menggunakan SNORT. Ketika terjadi akses yang tidak wajar pada server, maka SNORT akan mendeteksi dan mengirimkan informasi terjadinya aktivitas yang tidak wajar ke Administrator jaringan. Sistem ini diujikan dengan lima jenis serangan yakni PING Attack, DoS/DDoS Attack, Port Scanning, Telnet Access dan FTP Access. Parameter yang diamati pada penelitian ini adalah beban aktivitas yang terjadi pada sumber daya server meliputi CPU, Memory (RAM) dan beban jaringan. Hasil penelitian menunjukkan bahwa saat terjadi upaya serangan terhadap server, SNORT dapat menghasilkan alert yang akan disimpan pada log sekaligus dikirimkan ke handphone Administrator melalui SMS. AbstractServer security is an important thing that needs to be given more attention when configuring a server. In general, attacks that occur on the server are known after a failure on the server in providing services. In this study, a server security system was built that could monitor a server when an unusual activity was detected. Notifications will be sent via SMS (Short Message Service) to the network Administrator's smartphone. The system is built to detect intrusions on the server in real time using SNORT. When improper access occurs on the server, SNORT will detect and send information about the occurrence of unusual activity to the network Administrator. This system is tested with five types of attacks namely PING Attack, DoS / DDoS Attack, Port Scanning, Telnet Access and FTP Access. The parameters observed in this study are the activity load that occurs on server resources including CPU, Memory (RAM) and network load. The results showed that when an attempt was made to attack the server, SNORT could produce alerts that would be stored in a log as well as sent to the Administrator's smartphone via SMS.


Author(s):  
Ratna Ekawati ◽  
Yandra Arkeman ◽  
Suprihatin Suprihatin ◽  
Titi Candra Sunarti

Today's modern supply chain represents a complex and real-time, organization, resource, activity, information, and data source that is involved in the distribution of products and services ranging from upstream to downstream of the supply chain. In the past 4.0 supply chain technology was not just a linear business function, but as the center of the main process of ecosystems that are in a blind spot chained by value. With information as a foundation in the decision-making process so that information can create integrated and efficiently coordinated supply chains. So that it can show continuity from planning to production, inventory, quality, and price control in each chain. An inefficient distribution that results in mistrust among stakeholders, because it has an impact on the decline and loss of value chain in quality and quantity. Integrity problems from the data collected were found in this study. These findings include the identification of various stakeholders, including farmers, importers to customers, and regulators, as well as their needs, which will be described through the use case, and BPMN. The results obtained are that the main actors (stakeholders) of the system are divided into farmers, importers, processing factories, headquarters, hauling services, and markets (customers) in the distribution of product information flow systems. Suggests tracking and tracing based on real-time data flow of product information coming from each actor in the sugar supply chain that is equipped with an accurate data distribution information support system.


Sign in / Sign up

Export Citation Format

Share Document